Prioritizing Threats to Your Enterprise Data Security

Today’s enterprises face a wide variety of cyber threats that range from financially-motivated cybercriminals to state-sponsored hackers seeking business intelligence. There are many data sources that can provide information about these threats – but how can you determine which threats pose the greatest danger to your enterprise? How can you analyze threat data and use it to help improve your organization’s cyber defense?

Available:

On Demand

Duration:

1h 00min

When you attend this webinar, you will:

How to better organize your threat intel feeds

What to look for in your threat feed first

How to decide whether a “Critical” vulnerability is really critical to you

The roles of other business leaders in the decision of what is a priority.

Featured Speakers

Tom Parker

CTO

FusionX

Tom Parker, CTO of FusionX, is a recognized throughout the security industry for his research in multiple areas including adversary profiling and software vulnerability research & analysis. Tom has published over four books on the topic of information security including Cyber Adversary Characterization -Auditing the Hacker Mind and a contributor to the popular Stealing the Network Series. Tom is a frequent speaker at conferences including a past speaker at Blackhat. Tom often lends his time to guest lecturing at Universities, involvement in community research initiatives, and is often called to provide his expert opinion to mass media organizations, including BBC News, CNN, Reuters News, Wired and Business Week.

Travis Farral

Director of Security Strategy

Anomali

Travis Farral is the Director of Security Strategy for Anomali. With over 20 years of security industry experience, he has developed a strong background in threat intelligence, incident response, and Industrial Control Systems security. Previously Travis ran the Cybersecurity Intelligence & Strategic Services team at ExxonMobil and spent several years at companies such as Nokia and XTO Energy.